Results for 'graph algorithms'

993 found
Order:
  1.  58
    An Algorithm for Fast Recovery of Sparse Causal Graphs.Peter Spirtes - unknown
    Previous asymptotically correct algorithms for recovering causal structure from sample probabilities have been limited even in sparse graphs to a few variables. We describe an asymptotically correct algorithm whose complexity for fixed graph connectivity increases polynomially in the number of vertices, and may in practice recover sparse graphs with several hundred variables. From..
    No categories
    Direct download (4 more)  
     
    Export citation  
     
    Bookmark   8 citations  
  2.  18
    Graph Sparse Nonnegative Matrix Factorization Algorithm Based on the Inertial Projection Neural Network.Xiangguang Dai, Chuandong Li & Biqun Xiang - 2018 - Complexity 2018:1-12.
    We present a novel method, called graph sparse nonnegative matrix factorization, for dimensionality reduction. The affinity graph and sparse constraint are further taken into consideration in nonnegative matrix factorization and it is shown that the proposed matrix factorization method can respect the intrinsic graph structure and provide the sparse representation. Different from some existing traditional methods, the inertial neural network was developed, which can be used to optimize our proposed matrix factorization problem. By adopting one parameter in (...)
    No categories
    Direct download (3 more)  
     
    Export citation  
     
    Bookmark  
  3.  31
    Algorithms for Computing Wiener Indices of Acyclic and Unicyclic Graphs.Bo Bi, Muhammad Kamran Jamil, Khawaja Muhammad Fahd, Tian-Le Sun, Imran Ahmad & Lei Ding - 2021 - Complexity 2021:1-6.
    Let G = V G, E G be a molecular graph, where V G and E G are the sets of vertices and edges. A topological index of a molecular graph is a numerical quantity which helps to predict the chemical/physical properties of the molecules. The Wiener, Wiener polarity, and the terminal Wiener indices are the distance-based topological indices. In this paper, we described a linear time algorithm that computes the Wiener index for acyclic graphs and extended this (...)
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark  
  4.  11
    Neutrosophic graph theory and algorithms.Florentin Smarandache (ed.) - 2020 - Hershey, PA: Engineering Science Reference.
    Graph theory is a specific concept that has numerous applications throughout many industries. Despite the advancement of this technique, graph theory can still yield ambiguous and imprecise results. In order to cut down on these indeterminate factors, neutrosophic logic has emerged as an applicable solution that is gaining significant attention in solving many real-life decision-making problems that involve uncertainty, impreciseness, vagueness, incompleteness, inconsistency, and indeterminacy. However, empirical research on this specific graph set is lacking. Neutrosophic Graph (...)
    Direct download  
     
    Export citation  
     
    Bookmark  
  5.  9
    A Graph Convolutional Network-Based Sensitive Information Detection Algorithm.Ying Liu, Chao-Yu Yang & Jie Yang - 2021 - Complexity 2021:1-8.
    In the field of natural language processing, the task of sensitive information detection refers to the procedure of identifying sensitive words for given documents. The majority of existing detection methods are based on the sensitive-word tree, which is usually constructed via the common prefixes of different sensitive words from the given corpus. Yet, these traditional methods suffer from a couple of drawbacks, such as poor generalization and low efficiency. For improvement purposes, this paper proposes a novel self-attention-based detection algorithm using (...)
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark  
  6.  9
    Algorithms for searching explicit AND/OR graphs and their applications to problem reduction search.P. P. Chakrabarti - 1994 - Artificial Intelligence 65 (2):329-345.
  7.  9
    An admissible and optimal algorithm for searching AND/OR graphs.C. L. Chang & J. R. Slagle - 1971 - Artificial Intelligence 2 (2):117-128.
  8. Session 8B-Modeling and Algorithms-Dynamicity Aware Graph Relabeling Systems and the Constraint Based Synchronization: A Unifying Approach to Deal with Dynamic Networks.Arnaud Casteigts & Serge Chaumette - 2006 - In O. Stock & M. Schaerf (eds.), Lecture Notes in Computer Science. Springer Verlag. pp. 4138--688.
    No categories
     
    Export citation  
     
    Bookmark  
  9.  6
    An efficient algorithm for searching implicit AND/OR graphs with cycles.P. Jiménez & C. Torras - 2000 - Artificial Intelligence 124 (1):1-30.
  10.  91
    A Fast Algorithm for Discovering Sparse Causal Graphs.Peter Spirtes & Clark Glymour - unknown
    No categories
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark   1 citation  
  11.  13
    Graph structure and monadic second-order logic: a language-theoretic approach.B. Courcelle - 2012 - New York: Cambridge University Press. Edited by Joost Engelfriet.
    The study of graph structure has advanced in recent years with great strides: finite graphs can be described algebraically, enabling them to be constructed out of more basic elements. Separately the properties of graphs can be studied in a logical language called monadic second-order logic. In this book, these two features of graph structure are brought together for the first time in a presentation that unifies and synthesizes research over the last 25 years. The author not only provides (...)
    Direct download  
     
    Export citation  
     
    Bookmark   2 citations  
  12.  3
    How biased is the sample? Reverse engineering the ranking algorithm of Facebook’s Graph application programming interface.Justin Chun-Ting Ho - 2020 - Big Data and Society 7 (1).
    Facebook research has proliferated during recent years. However, since November 2017, Facebook has introduced a new limitation on the maximum amount of page posts retrievable through their Graph application programming interface, while there is limited documentation on how these posts are selected. This paper compares two datasets of the same Facebook page, a full dataset obtained before the introduction of the limitation and a partial dataset obtained after, and employs bootstrapping technique to assess the bias caused by the new (...)
    No categories
    Direct download  
     
    Export citation  
     
    Bookmark   1 citation  
  13. Improved Local Search for Graph Edit Distance.Nicolas Boria, David Blumenthal, Bougleux B., Brun Sébastien & Luc - 2020 - Pattern Recognition Letters 129:19–25.
    The graph edit distance (GED) measures the dissimilarity between two graphs as the minimal cost of a sequence of elementary operations transforming one graph into another. This measure is fundamental in many areas such as structural pattern recognition or classification. However, exactly computing GED is NP-hard. Among different classes of heuristic algorithms that were proposed to compute approximate solutions, local search based algorithms provide the tightest upper bounds for GED. In this paper, we present K-REFINE and (...)
    No categories
     
    Export citation  
     
    Bookmark  
  14.  9
    Separators and adjustment sets in causal graphs: Complete criteria and an algorithmic framework.Benito van der Zander, Maciej Liśkiewicz & Johannes Textor - 2019 - Artificial Intelligence 270 (C):1-40.
  15.  8
    Algorithms from THE BOOK.Kenneth Lange - 2020 - Philadelphia, PA: The Society for Industrial and Applied Mathematics.
    Ancient algorithms -- Sorting -- Graph algorithms -- Primality testing -- Solution of linear equations -- Newton's method -- Linear programming -- Eigenvalues and eigenvectors -- MM algorithms -- Data mining -- The fast Fourier transform -- Monte Carlo methods -- Mathematical review.
    Direct download  
     
    Export citation  
     
    Bookmark  
  16.  8
    Scheduling with complete multipartite incompatibility graph on parallel machines: Complexity and algorithms.Tytus Pikies, Krzysztof Turowski & Marek Kubale - 2022 - Artificial Intelligence 309 (C):103711.
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark  
  17.  10
    Word morph and topological structures: A graph generating algorithm.Jürgen Klüver, Jörn Schmidt & Christina Klüver - 2016 - Complexity 21 (S1):426-436.
    No categories
    Direct download  
     
    Export citation  
     
    Bookmark   1 citation  
  18.  10
    Adaptive graph Laplacian MTL L1, L2 and LS-SVMs.Carlos Ruiz, Carlos M. Alaíz & José R. Dorronsoro - forthcoming - Logic Journal of the IGPL.
    Multi-Task Learning tries to improve the learning process of different tasks by solving them simultaneously. A popular Multi-Task Learning formulation for SVM is to combine common and task-specific parts. Other approaches rely on using a Graph Laplacian regularizer. Here we propose a combination of these two approaches that can be applied to L1, L2 and LS-SVMs. We also propose an algorithm to iteratively learn the graph adjacency matrix used in the Laplacian regularization. We test our proposal with synthetic (...)
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark  
  19.  48
    Twilight graphs.J. C. E. Dekker - 1981 - Journal of Symbolic Logic 46 (3):539-571.
    This paper deals primarily with countable, simple, connected graphs and the following two conditions which are trivially satisfied if the graphs are finite: (a) there is an edge-recognition algorithm, i.e., an effective procedure which enables us, given two distinct vertices, to decide whether they are adjacent, (b) there is a shortest path algorithm, i.e., an effective procedure which enables us, given two distinct vertices, to find a minimal path joining them. A graph $G = \langle\eta, \eta\rangle$ with η as (...)
    Direct download (7 more)  
     
    Export citation  
     
    Bookmark  
  20.  11
    Graph Grammar Formalism with Multigranularity for Spatial Graphs.Yufeng Liu, Fan Yang & Jian Liu - 2023 - Journal of Logic, Language and Information 32 (5):809-827.
    Traditional spatial enabled grammars lack flexibility in specifying the spatial semantics of graphs. This paper describes a new graph grammar formalism called the multigranularity Coordinate Graph Grammar (mgCGG) for spatial graphs. Based on the Coordinate Graph Grammar (CGG), the mgCGG divides coordinates into two categories, physical coordinates and grammatical coordinates, where physical coordinates are the common coordinates in the real world, and grammatical coordinates describe the restrictions on the spatial semantics. In the derivation and reduction of the (...)
    Direct download (3 more)  
     
    Export citation  
     
    Bookmark  
  21. Uniform Single Valued Neutrosophic Graphs.S. Broumi, A. Dey, A. Bakali, M. Talea, F. Smarandache, L. H. Son & D. Koley - 2017 - Neutrosophic Sets and Systems 17:42-49.
    In this paper, we propose a new concept named the uniform single valued neutrosophic graph. An illustrative example and some properties are examined. Next, we develop an algorithmic approach for computing the complement of the single valued neutrosophic graph. A numerical example is demonstrated for computing the complement of single valued neutrosophic graphs and uniform single valued neutrosophic graph.
    Direct download (3 more)  
     
    Export citation  
     
    Bookmark  
  22.  17
    Protein-protein interactions: Making sense of networks via graph-theoretic modeling.Nataša Pržulj - 2011 - Bioessays 33 (2):115-123.
    The emerging area of network biology is seeking to provide insights into organizational principles of life. However, despite significant collaborative efforts, there is still typically a weak link between biological and computational scientists and a lack of understanding of the research issues across the disciplines. This results in the use of simple computational techniques of limited potential that are incapable of explaining these complex data. Hence, the danger is that the community might begin to view the topological properties of network (...)
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark  
  23.  5
    Sparse Graph Embedding Based on the Fuzzy Set for Image Classification.Minghua Wan, Mengting Ge, Tianming Zhan, Zhangjing Yang, Hao Zheng & Guowei Yang - 2021 - Complexity 2021:1-10.
    In recent years, many face image feature extraction and dimensional reduction algorithms have been proposed for linear and nonlinear data, such as local-based graph embedding algorithms or fuzzy set algorithms. However, the aforementioned algorithms are not very effective for face images because they are always affected by overlaps and sparsity points in the database. To solve the problems, a new and effective dimensional reduction method for face recognition is proposed—sparse graph embedding with the fuzzy (...)
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark  
  24.  6
    Asser Günter , pp. 20–27) has meanwhile gone farther and shown, inter alia, the equivalence of Kalužnin's graph-schematic algorithm concept with Asser's functional-algorithm concept. [REVIEW]E. M. Fels - 1962 - Journal of Symbolic Logic 27 (3):364-364.
    Direct download (3 more)  
     
    Export citation  
     
    Bookmark  
  25.  9
    Corrigendum to “Separators and adjustment sets in causal graphs: Complete criteria and an algorithmic framework” [Artif. Intell. 270 (2019) 1–40]. [REVIEW]Benito van der Zander, Maciej Liśkiewicz & Johannes Textor - 2023 - Artificial Intelligence 321 (C):103938.
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark  
  26.  28
    Algorithmic uses of the Feferman–Vaught Theorem.J. A. Makowsky - 2004 - Annals of Pure and Applied Logic 126 (1-3):159-213.
    The classical Feferman–Vaught Theorem for First Order Logic explains how to compute the truth value of a first order sentence in a generalized product of first order structures by reducing this computation to the computation of truth values of other first order sentences in the factors and evaluation of a monadic second order sentence in the index structure. This technique was later extended by Läuchli, Shelah and Gurevich to monadic second order logic. The technique has wide applications in decidability and (...)
    Direct download (4 more)  
     
    Export citation  
     
    Bookmark   7 citations  
  27.  12
    Basic concepts in algorithms.Shmuel T. Klein - 2021 - Hoboken: World Scientific.
    This book is the result of several decades of teaching experience in data structures and algorithms. It is self-contained but does assume some prior knowledge of data structures, and a grasp of basic programming and mathematics tools. Basic Concepts in Algorithms focuses on more advanced paradigms and methods combining basic programming constructs as building blocks and their usefulness in the derivation of algorithms. Its coverage includes the algorithms' design process and an analysis of their performance. It (...)
    Direct download  
     
    Export citation  
     
    Bookmark  
  28.  28
    Ramsey-type graph coloring and diagonal non-computability.Ludovic Patey - 2015 - Archive for Mathematical Logic 54 (7-8):899-914.
    A function is diagonally non-computable if it diagonalizes against the universal partial computable function. D.n.c. functions play a central role in algorithmic randomness and reverse mathematics. Flood and Towsner asked for which functions h, the principle stating the existence of an h-bounded d.n.c. function implies Ramsey-type weak König’s lemma. In this paper, we prove that for every computable order h, there exists an ω\documentclass[12pt]{minimal} \usepackage{amsmath} \usepackage{wasysym} \usepackage{amsfonts} \usepackage{amssymb} \usepackage{amsbsy} \usepackage{mathrsfs} \usepackage{upgreek} \setlength{\oddsidemargin}{-69pt} \begin{document}$${\omega}$$\end{document} -model of h-DNR which is not a not (...)
    Direct download (4 more)  
     
    Export citation  
     
    Bookmark   2 citations  
  29.  7
    Knowledge Big Graph Fusing Ontology with Property Graph: A Case Study of Financial Ownership Network.Yan Liu, Wei-Gang Fu & Xiao-Bo Tang - 2021 - Knowledge Organization 48 (1):55-71.
    The scale of know­ledge is growing rapidly in the big data environment, and traditional know­ledge organization and services have faced the dilemma of semantic inaccuracy and untimeliness. From a know­ledge fusion perspective-combining the precise semantic superiority of traditional ontology with the large-scale graph processing power and the predicate attribute expression ability of property graph-this paper presents an ontology and property graph fusion framework (OPGFF). The fusion process is divided into content layer fusion and constraint layer fusion. The (...)
    No categories
    Direct download  
     
    Export citation  
     
    Bookmark  
  30.  13
    A novel memetic algorithm for solving the generalized traveling salesman problem.Ovidiu Cosma, Petrică C. Pop & Laura Cosma - forthcoming - Logic Journal of the IGPL.
    This paper investigates the Generalized Traveling Salesman Problem (GTSP), which is an extension of the well-known Traveling Salesman Problem (TSP), and it searches for an optimal tour in a clustered graph, such that every cluster is visited exactly once. In this paper, we describe a novel Memetic Algorithm (MA) for solving efficiently the GTSP. Our proposed MA has at its core a genetic algorithm (GA), completed by a Chromosome Enhancement Procedure (CEP), which is based on a TSP solver and (...)
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark  
  31.  8
    Techniques for designing and analyzing algorithms.Douglas R. Stinson - 2021 - Boca Raton: C&H\CRC Press.
    Design and analysis of algorithms can be a difficult subject for students due to its sometimes-abstract nature and its use of a wide variety of mathematical tools. Here the author, an experienced and successful textbook writer, makes the subject as straightforward as possible in an up-to-date textbook incorporating various new developments appropriate for an introductory course. This text presents the main techniques of algorithm design, namely, divide-and-conquer algorithms, greedy algorithms, dynamic programming algorithms, and backtracking. Graph (...)
    Direct download  
     
    Export citation  
     
    Bookmark  
  32. Assyrian Merchants meet Nuclear Physicists: History of the Early Contributions from Social Sciences to Computer Science. The Case of Automatic Pattern Detection in Graphs (1950s-1970s).Sébastien Plutniak - 2021 - Interdisciplinary Science Reviews 46 (4):547-568.
    Community detection is a major issue in network analysis. This paper combines a socio-historical approach with an experimental reconstruction of programs to investigate the early automation of clique detection algorithms, which remains one of the unsolved NP-complete problems today. The research led by the archaeologist Jean-Claude Gardin from the 1950s on non-numerical information and graph analysis is retraced to demonstrate the early contributions of social sciences and humanities. The limited recognition and reception of Gardin's innovative computer application to (...)
    Direct download  
     
    Export citation  
     
    Bookmark  
  33.  8
    An elementary approach to design and analysis of algorithms.L. R. Vermani - 2019 - New Jersey: World Scientific. Edited by Shalini Vermani.
    In computer science, an algorithm is an unambiguous specification of how to solve a class of problems. Algorithms can perform calculation, data processing and automated reasoning tasks. As an effective method, an algorithm can be expressed within a finite amount of space and time and in a well-defined formal language for calculating a function. Starting from an initial state and initial input (perhaps empty), the instructions describe a computation that, when executed, proceeds through a finite number of well-defined successive (...)
    Direct download  
     
    Export citation  
     
    Bookmark  
  34. Replacing Causal Faithfulness with Algorithmic Independence of Conditionals.Jan Lemeire & Dominik Janzing - 2013 - Minds and Machines 23 (2):227-249.
    Independence of Conditionals (IC) has recently been proposed as a basic rule for causal structure learning. If a Bayesian network represents the causal structure, its Conditional Probability Distributions (CPDs) should be algorithmically independent. In this paper we compare IC with causal faithfulness (FF), stating that only those conditional independences that are implied by the causal Markov condition hold true. The latter is a basic postulate in common approaches to causal structure learning. The common spirit of FF and IC is to (...)
    Direct download (8 more)  
     
    Export citation  
     
    Bookmark   3 citations  
  35. An anytime algorithm for causal inference.Peter Spirtes - unknown
    The Fast Casual Inference (FCI) algorithm searches for features common to observationally equivalent sets of causal directed acyclic graphs. It is correct in the large sample limit with probability one even if there is a possibility of hidden variables and selection bias. In the worst case, the number of conditional independence tests performed by the algorithm grows exponentially with the number of variables in the data set. This affects both the speed of the algorithm and the accuracy of the algorithm (...)
     
    Export citation  
     
    Bookmark   2 citations  
  36. A polynomial time algorithm for determining Dag equivalence in the presence of latent variables and selection bias.Peter Spirtes - unknown
    if and only if for every W in V, W is independent of the set of all its non-descendants conditional on the set of its parents. One natural question that arises with respect to DAGs is when two DAGs are “statistically equivalent”. One interesting sense of “statistical equivalence” is “d-separation equivalence” (explained in more detail below.) In the case of DAGs, d-separation equivalence is also corresponds to a variety of other natural senses of statistical equivalence (such as representing the same (...)
     
    Export citation  
     
    Bookmark   2 citations  
  37.  20
    Modulation of Brain Functional Connectivity and Efficiency During an Endurance Cycling Task: A Source-Level EEG and Graph Theory Approach.Gabriella Tamburro, Selenia di Fronso, Claudio Robazza, Maurizio Bertollo & Silvia Comani - 2020 - Frontiers in Human Neuroscience 14:551041.
    Various methods have been employed to investigate different aspects of the brain activity modulation related to the performance of a cycling task. In our study we examined how functional connectivity and brain network efficiency varied during an endurance cycling task. To this purpose, we reconstructed EEG signals at source level: we computed current densities in 28 anatomical regions of interest (ROIs) through the eLORETA algorithm, then we calculated the Lagged Coherence of the 28 current density signals to define the adjacency (...)
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark   1 citation  
  38.  31
    Automatic semantic edge labeling over legal citation graphs.Ali Sadeghian, Laksshman Sundaram, Daisy Zhe Wang, William F. Hamilton, Karl Branting & Craig Pfeifer - 2018 - Artificial Intelligence and Law 26 (2):127-144.
    A large number of cross-references to various bodies of text are used in legal texts, each serving a different purpose. It is often necessary for authorities and companies to look into certain types of these citations. Yet, there is a lack of automatic tools to aid in this process. Recently, citation graphs have been used to improve the intelligibility of complex rule frameworks. We propose an algorithm that builds the citation graph from a document and automatically labels each edge (...)
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark   2 citations  
  39.  12
    A Comparative Study of Three Resolving Parameters of Graphs.Hafiz Muhammad Ikhlaq, Hafiz Muhammad Afzal Siddiqui & Muhammad Imran - 2021 - Complexity 2021:1-13.
    Graph theory is one of those subjects that is a vital part of the digital world. It is used to monitor the movement of robots on a network, to debug computer networks, to develop algorithms, and to analyze the structural properties of chemical structures, among other things. It is also useful in airplane scheduling and the study of diffusion mechanisms. The parameters computed in this article are very useful in pattern recognition and image processing. A number d f, (...)
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark  
  40.  13
    A bottom-up algorithm for solving ♯2SAT.Guillermo De Ita, J. Raymundo Marcial-Romero & J. A. HernÁndez-ServÍn - 2020 - Logic Journal of the IGPL 28 (6):1130-1140.
    Counting models for a two conjunctive formula $F$, a problem known as $\sharp $2Sat, is a classic $\sharp $P complete problem. Given a 2-CF $F$ as input, its constraint graph $G$ is built. If $G$ is acyclic, then $\sharp $2Sat can be computed efficiently. In this paper, we address the case when $G$ has cycles. When $G$ is cyclic, we propose a decomposition on the constraint graph $G$ that allows the computation of $\sharp $2Sat in incremental way. Let (...)
    Direct download (3 more)  
     
    Export citation  
     
    Bookmark  
  41.  9
    Test Case Prioritization—ANT Algorithm With Faults Severity.Andreea Vescan, Camelia-M. Pintea & Petrică C. Pop - 2022 - Logic Journal of the IGPL 30 (2):277-288.
    Regression testing is applied whenever a code changes, ensuring that the modifications fixed the fault and no other faults are introduced. Due to a large number of test cases to be run, test case prioritization is one of the strategies that allows to run the test cases with the highest fault rate first. The aim of the paper is to present an optimized test case prioritization method inspired by ant colony optimization, test case prioritization–ANT. The criteria used by the optimization (...)
    Direct download (3 more)  
     
    Export citation  
     
    Bookmark  
  42.  27
    Ligatures in Peirce's existential graphs.Frithjof Dau - 2011 - Semiotica 2011 (186):89-109.
    Lines of Identity are important elements in Existential Graphs. They can be assembled to whole networks called “ligatures.” They are not straightforwardly understandable: for example, in constrast to LoI, ligatures may stand for more than one object.This article elaborates the handling of ligatures. It is precisely investigated how ligatures are dealt with in the calculus and how they can be modified without changing the meaning of a graph. Finally, a sufficient criterion for reading a ligature similar to a LoI (...)
    Direct download (5 more)  
     
    Export citation  
     
    Bookmark   1 citation  
  43. Heuristic greedy search algorithms for latent variable models.Peter Spirtes - unknown
    A Bayesian network consists of two distinct parts: a directed acyclic graph (DAG or belief-network structure) and a set of parameters for the DAG. The DAG in a Bayesian network can be used to represent both causal hypotheses and sets of probability distributions. Under the causal interpretation, a DAG represents the causal relations in a given population with a set of vertices V when there is an edge from A to B if and only if A is a direct (...)
     
    Export citation  
     
    Bookmark   1 citation  
  44.  49
    Combining strength and uncertainty for preferences in the graph model for conflict resolution with multiple decision makers.Haiyan Xu, Keith W. Hipel, D. Marc Kilgour & Ye Chen - 2010 - Theory and Decision 69 (4):497-521.
    A hybrid preference framework is proposed for strategic conflict analysis to integrate preference strength and preference uncertainty into the paradigm of the graph model for conflict resolution (GMCR) under multiple decision makers. This structure offers decision makers a more flexible mechanism for preference expression, which can include strong or mild preference of one state or scenario over another, as well as equal preference. In addition, preference between two states can be uncertain. The result is a preference framework that is (...)
    Direct download (3 more)  
     
    Export citation  
     
    Bookmark   1 citation  
  45.  15
    Classification of drug-naive children with attention-deficit/hyperactivity disorder from typical development controls using resting-state fMRI and graph theoretical approach.Masoud Rezaei, Hoda Zare, Hamidreza Hakimdavoodi, Shahrokh Nasseri & Paria Hebrani - 2022 - Frontiers in Human Neuroscience 16.
    Background and objectivesThe study of brain functional connectivity alterations in children with Attention-Deficit/Hyperactivity Disorder has been the subject of considerable investigation, but the biological mechanisms underlying these changes remain poorly understood. Here, we aim to investigate the brain alterations in patients with ADHD and Typical Development children and accurately classify ADHD children from TD controls using the graph-theoretical measures obtained from resting-state fMRI.Materials and methodsWe investigated the performances of rs-fMRI data for classifying drug-naive children with ADHD from TD controls. (...)
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark  
  46.  14
    A transformational characterization of Markov equivalence for directed acyclic graphs with latent variables.Jiji Zhang & Peter Spirtes - unknown
    Different directed acyclic graphs may be Markov equivalent in the sense that they entail the same conditional independence relations among the observed variables. Chickering provided a transformational characterization of Markov equivalence for DAGs, which is useful in deriving properties shared by Markov equivalent DAGs, and, with certain generalization, is needed to prove the asymptotic correctness of a search procedure over Markov equivalence classes, known as the GES algorithm. For DAG models with latent variables, maximal ancestral graphs provide a neat representation (...)
    No categories
    Direct download  
     
    Export citation  
     
    Bookmark   3 citations  
  47.  6
    Proceedings of the International Workshop on Combinatorial Algorithms, 2007.Ljiljana Brankovic, Yuqing Lin & Bill Smyth (eds.) - 2008 - London: College Publications.
    The International Workshop on Combinatorial Algorithms was established in 1989 as the Australasian Workshop on Combinatorial Algorithms. As a consequence of the workshop's success in attracting mathematicians and computer scientists from around the world, it was decided at the 2006 meeting to go global, to change the workshop's name, and to hold it in appropriate venues around the world. The workshop supports basic research on the interface between mathematics and computing, specifically * Algorithms & Data Structures * (...)
    Direct download  
     
    Export citation  
     
    Bookmark  
  48.  73
    Dominance-Partitioned Subgraph Matching on Large RDF Graph.Bo Ning, Yunhao Sun, Deji Zhao, Weikang Xing & Guanyu Li - 2020 - Complexity 2020:1-18.
    Subgraph matching on a large graph has become a popular research topic in the field of graph analysis, which has a wide range of applications including question answering and community detection. However, traditional edge-cutting strategy destroys the structure of indivisible knowledge in a large RDF graph. On the premise of load-balancing on subgraph division, a dominance-partitioned strategy is proposed to divide a large RDF graph without compromising the knowledge structure. Firstly, a dominance-connected pattern graph is (...)
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark  
  49.  11
    Unifying Gaussian LWF and AMP Chain Graphs to Model Interference.Jose M. Peña - 2020 - Journal of Causal Inference 8 (1):1-21.
    An intervention may have an effect on units other than those to which it was administered. This phenomenon is called interference and it usually goes unmodeled. In this paper, we propose to combine Lauritzen-Wermuth-Frydenberg and Andersson-Madigan-Perlman chain graphs to create a new class of causal models that can represent both interference and non-interference relationships for Gaussian distributions. Specifically, we define the new class of models, introduce global and local and pairwise Markov properties for them, and prove their equivalence. We also (...)
    Direct download  
     
    Export citation  
     
    Bookmark  
  50.  2
    An Efficient Recommendation Algorithm Based on Heterogeneous Information Network.Ying Yin & Wanning Zheng - 2021 - Complexity 2021:1-18.
    Heterogeneous information networks can naturally simulate complex objects, and they can enrich recommendation systems according to the connections between different types of objects. At present, a large number of recommendation algorithms based on heterogeneous information networks have been proposed. However, the existing algorithms cannot extract and combine the structural features in heterogeneous information networks. Therefore, this paper proposes an efficient recommendation algorithm based on heterogeneous information network, which uses the characteristics of graph convolution neural network to automatically (...)
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark  
1 — 50 / 993